Главная
Study mode:
on
1
Introduction
2
What do you do
3
How do we know
4
There is no free lunch
5
Flaws and bugs
6
Benefits of threat modeling
7
A quote from a participant
8
Threat modeling
9
When to do threat modeling
10
How to do threat modeling
11
S scoping
12
Models are wrong
13
Generic documentation
14
granularity
15
data flow diagrams
16
data movement
17
identifying threats
18
rating threat boundaries
19
focusing on flaws
20
finding threats
21
spoofing
22
tampering
23
integrity
24
information disclosure
25
denial of service
26
elevation of privilege
27
external entities
28
resources
29
threat modeling tool
30
rating threats
31
mitigations
32
Summary
33
Recommendation
Description:
Learn threat modeling techniques to identify security weaknesses in system design through this comprehensive conference talk. Discover why 50% of security issues stem from design problems and how threat modeling can help uncover vulnerabilities that automated tools miss. Explore the process of analyzing systems, identifying missing security controls, and recognizing potential threats. Gain insights into when and how to perform threat modeling, including scoping, creating data flow diagrams, and rating threats. Master strategies for finding and mitigating various types of threats such as spoofing, tampering, and denial of service. Apply these valuable skills to enhance the security of your systems and prevent design-related vulnerabilities.

Threat Modeling

NDC Conferences
Add to list